Skip to content

Conversation

@albertzaharovits
Copy link
Contributor

ES Security hides certain indices, which should not be accessed by non-superusers.
This PR hides the .async-search-* namespace, the same way .security is hidden. The value of the namespace is hard-coded.

I have qualms about ES Security hiding an index which is not its own. Ideally, other plugins should have the capability to register such indices, but I don't see an easy way to achieve this.

I plan to raise a follow-up that adds a new origin and system user that makes use of the new restricted index namespace. Also, the ILM origin should be adjusted (also in a follow-up) to allow ILM to work over this namespace.

PS this can also be targeted to a feature branch if this is more appropriate.

CC @jimczi
Relates #49931

@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (:Security/Security)

@albertzaharovits
Copy link
Contributor Author

@tvernum I've addressed the review comments, please take another look.

Copy link
Contributor

@tvernum tvernum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@albertzaharovits albertzaharovits merged commit a620525 into elastic:master Jan 13, 2020
@albertzaharovits albertzaharovits deleted the restricted_indices_pattern branch January 13, 2020 09:16
albertzaharovits added a commit that referenced this pull request Jan 13, 2020
Hide the `.async-search-*` in Security by making it a restricted index namespace.
The namespace is hard-coded.
To grant privileges on restricted indices, one must explicitly toggle the
`allow_restricted_indices` flag in the indices permission in the role definition.
As is the case with any other index, if a certain user lacks all permissions for an
index, that index is effectively nonexistent for that user.
SivagurunathanV pushed a commit to SivagurunathanV/elasticsearch that referenced this pull request Jan 23, 2020
Hide the `.async-search-*` in Security by making it a restricted index namespace.
The namespace is hard-coded.
To grant privileges on restricted indices, one must explicitly toggle the
`allow_restricted_indices` flag in the indices permission in the role definition.
As is the case with any other index, if a certain user lacks all permissions for an
index, that index is effectively nonexistent for that user.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants